Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to overwrite arbitrary files via a symlink attack on the .k5login file.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Puppet | Puppet | 2.6.0 (including) | 2.6.0 (including) |
Puppet | Puppet | 2.6.1 (including) | 2.6.1 (including) |
Puppet | Puppet | 2.6.2 (including) | 2.6.2 (including) |
Puppet | Puppet | 2.6.3 (including) | 2.6.3 (including) |
Puppet | Puppet | 2.6.4 (including) | 2.6.4 (including) |
Puppet | Puppet | 2.6.5 (including) | 2.6.5 (including) |
Puppet | Puppet | 2.6.6 (including) | 2.6.6 (including) |
Puppet | Puppet | 2.6.7 (including) | 2.6.7 (including) |
Puppet | Puppet | 2.6.8 (including) | 2.6.8 (including) |
Puppet | Puppet | 2.6.9 (including) | 2.6.9 (including) |
Puppet | Puppet | 2.6.10 (including) | 2.6.10 (including) |
Puppet | Puppet | 2.7.2 (including) | 2.7.2 (including) |
Puppet | Puppet | 2.7.3 (including) | 2.7.3 (including) |
Puppet | Puppet | 2.7.4 (including) | 2.7.4 (including) |
Puppet | Puppetlabs | 2.7.0 (including) | 2.7.0 (including) |
Puppet | Puppetlabs | 2.7.1 (including) | 2.7.1 (including) |
Puppet | Ubuntu | devel | * |
Puppet | Ubuntu | hardy | * |
Puppet | Ubuntu | lucid | * |
Puppet | Ubuntu | maverick | * |
Puppet | Ubuntu | natty | * |
Puppet | Ubuntu | upstream | * |